assetnote / newtownerLinks
Abuse trust-boundaries to bypass firewalls and network controls
☆370Updated last month
Alternatives and similar repositories for newtowner
Users that are interested in newtowner are comparing it to the libraries listed below
Sorting:
- ☆172Updated 3 weeks ago
- jxscout superpowers JavaScript analysis for security researchers☆246Updated 3 months ago
- unleashed ffuf☆221Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆318Updated 9 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆77Updated 6 months ago
- ☆142Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆75Updated 5 months ago
- A collection of Turbo Intruder scripts.☆64Updated 7 months ago
- ☆189Updated 4 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆84Updated 2 months ago
- ☆105Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆235Updated this week
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 2 months ago
- A research project to add some brrrrrr to Burp☆187Updated 6 months ago
- FrogPost: postMessage Security Testing Tool☆96Updated 3 months ago
- Tool to parse subdomains from dmarc.live☆142Updated last year
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆226Updated last month
- A streamlined tool for discovering private TLDs for security research.☆217Updated this week
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆135Updated 5 months ago
- ☆132Updated 10 months ago
- ai-based domain name generation☆94Updated 7 months ago
- AI/LLM local model integration for analysis of reconftw results☆77Updated 4 months ago
- ☆198Updated last year
- Gotta go fast☆148Updated 2 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆198Updated 9 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆125Updated 2 weeks ago
- Finds graphql queries in javascript files☆63Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆137Updated 8 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated 8 months ago